answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
neonofarm [45]
2 years ago
6

Naomi is giving a presentation on historical figures. She has all the pictures of the people she wants to talk about. After each

picture, she wants to write a summary of the accomplishments of each person. Which represent the process for making her presentation?
A Click on File/Disk, select all pictures using the Shift key, and select New Text Box after each person.
B Click on New Text Box, select File/Disk, select a picture, then repeat for each one.
C Click on File/Disk, select each picture, then add captions to each slide.
D Click on New Text Box, select all pictures using the Shift key, then add captions to each slide.
Computers and Technology
1 answer:
kykrilka [37]2 years ago
4 0
The answer would be A. The most efficient way is putting all the pictures on the presentation first and then just put a new text box after each picture and then just repeat the process for all the pictures. 
You might be interested in
Find true or false. A hacker is hacking software with access in sensitive information from your computer​
Alina [70]
ITS TRUE!!I SEARCHED IT
7 0
1 year ago
Most ________ are accompanied by several common utility programs, including a search program, a storage management program, and
diamong [38]

Answer:

operating systems

Explanation:

The operating systems is shortly known as OS. It is a system software which manages the software resources of the computer, computer hardware and also provides some common services for the various computer programs.

Most of the operating systems available in the market provides some common utility programs such as the search program, a backup program and a storage management program also.

Some common operating systems are : Linux, Microsoft Windows, Ubuntu, macOS, Unix, and many more.

4 0
2 years ago
Using the college registration example from section 6.7.3 as a starting point, do the following:
Arada [10]

Answer:

Explanation:

NCLUDE Irvine32.inc

TRUE = 1

FALSE = 0

.data

gradeAverage WORD ?

credits WORD ?

oKToRegister BYTE ?

str1 BYTE "Error: Credits must be between 1 and 30" , 0dh,0ah,0

main PROC

call CheckRegs

exit

main ENDP

CheckRegs PROC

push edx

mov OkToRegister,FALSE

; Check credits for valid range 1-30

cmp credits,1 ; credits < 1?

jb E1

cmp credits,30 ; credits > 30?

ja E1

jmp L1 ; credits are ok

; Display error message: credits out of range

E1:

mov edx,OFFSET str1

call WriteString

jmp L4

L1:

cmp gradeAverage,350 ; if gradeAverage > 350

jna L2

mov OkToRegister,TRUE ; OkToRegister = TRUE

jmp L4

L2:

cmp gradeAverage,250 ; elseif gradeAverage > 250

jna L3

cmp credits,16 ; && credits <= 16

jnbe L3

mov OkToRegister,TRUE ; OKToRegister = TRUE

jmp L4

L3:

cmp credits,12 ; elseif credits <= 12

ja L4

mov OkToRegister,TRUE ; OKToRegister = TRUE

L4:

pop edx ; endif

ret

CheckRegs ENDP

END main

8 0
2 years ago
Which of the following is considered technology?
nevsk [136]
A. computer
computer because computer is technology and pencil is not and spoon.
8 0
2 years ago
Modify the closest pair of points algorithm so that the separating line L now separates the first n/4 points (sorted according t
Nutka1998 [239]

Answer:

Check the explanation

Explanation:

Kindly check the attached images below to see the step by step explanation to the question above.

3 0
2 years ago
Other questions:
  • Which table style option is useful to display aggregated data when it is checked? total row filter button last column header row
    8·1 answer
  • What are the pros and cons of using unique closing reserved words on compound statements?
    15·1 answer
  • Cathy connected a keyboard, mouse, and printer to her computer through a Bluetooth connection. What type of network has she crea
    10·2 answers
  • The OSI security architecture provides a systematic framework for defining security attacks, mechanisms, and services. True or F
    12·1 answer
  • Suppose that, even unrealistically, we are to search a list of 700 million items using Binary Search, Recursive (Algorithm 2.1).
    11·1 answer
  • A Salesforce administrator adding a recommendations carousel component in Community Builder. The page displays correctly in Comm
    12·1 answer
  • Define a structure type auto_t to represent an automobile. Include components for the make and model (strings), the odometer rea
    13·1 answer
  • Three variables , x, y and z, supposedly hold strings of digits, suitable for converting to integers. Write code that converts t
    9·2 answers
  • What prevents someone who randomly picks up your phone from sending money to themselves using a messenger-based payment?
    14·1 answer
  • A natural language processor reads the sentence The walk was tiring and mistakes the noun “walk” as a verb. What is such an erro
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!